{"id":10437,"date":"2019-01-15T00:45:29","date_gmt":"2019-01-15T00:45:29","guid":{"rendered":"https:\/\/afaghhosting.net\/blog\/?p=10437"},"modified":"2019-01-15T00:45:29","modified_gmt":"2019-01-15T00:45:29","slug":"cve-2019-6244","status":"publish","type":"post","link":"https:\/\/afaghhosting.net\/blog\/cve-2019-6244\/","title":{"rendered":"CVE-2019-6244"},"content":{"rendered":"<p dir=\"ltr\">\n<div id=\"topcontainer\" dir=\"ltr\">\n<div id=\"topleft\"><a title=\"Go to cvedetails.com homepage\" href=\"https:\/\/www.cvedetails.com\/\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" title=\"CVEdetails.com the ultimate security vulnerability data source\" src=\"https:\/\/afaghhosting.net\/blog\/wp-content\/uploads\/2019\/01\/cve-2019-6244.png\" alt=\"CVEdetails.com the ultimate security vulnerability data source\" border=\"0\" \/><\/a><\/div>\n<\/div>\n<p dir=\"ltr\">\n<p dir=\"ltr\">\n<table id=\"maintable\" dir=\"ltr\">\n<tbody>\n<tr>\n<td id=\"mainmenutd\" valign=\"top\"><\/td>\n<td align=\"left\" valign=\"top\">&nbsp;<\/p>\n<div id=\"contentdiv\">\n<table border=\"0\" cellspacing=\"0\" cellpadding=\"1\">\n<tbody>\n<tr>\n<td id=\"cvedetails\" valign=\"top\">An issue was discovered in UsualToolCMS 8.0. cmsadmin\/a_sqlbackx.php?t=sql allows CSRF attacks that can execute SQL statements, and consequently execute arbitrary PHP code by writing that code into a .php file.<br \/>\n<span class=\"datenote\"> Publish Date : 2019-01-11 Last Update Date : 2019-01-11 <\/span><\/p>\n<p><!-- [if IE]>\n\n\n\n<style type=\"text\/css\"> .menubarmain div { left:0; top:1.5em; } <\/style>\n\n <![endif]--><\/p>\n<h2><span id=\"pm_cvssscorestable\" class=\"pm\">&#8211;<\/span> CVSS Scores &amp; Vulnerability Types<\/h2>\n<table>\n<tbody>\n<tr>\n<td>\n<table id=\"cvssscorestable\" class=\"details\">\n<tbody>\n<tr>\n<th>CVSS Score<\/th>\n<td>0.0<\/td>\n<\/tr>\n<tr>\n<th>Confidentiality Impact<\/th>\n<td>???<\/td>\n<\/tr>\n<tr>\n<th>Integrity Impact<\/th>\n<td>???<\/td>\n<\/tr>\n<tr>\n<th>Availability Impact<\/th>\n<td>???<\/td>\n<\/tr>\n<tr>\n<th>Access Complexity<\/th>\n<td>???<\/td>\n<\/tr>\n<tr>\n<th>Authentication<\/th>\n<td>???<\/td>\n<\/tr>\n<tr>\n<th>Gained Access<\/th>\n<td>None<\/td>\n<\/tr>\n<tr>\n<th>Vulnerability Type(s)<\/th>\n<td><span class=\"vt_ec\">Execute Code<\/span><span class=\"vt_csrf\">CSRF <\/span><\/td>\n<\/tr>\n<tr>\n<th>CWE ID<\/th>\n<td>CWE id is not defined for this vulnerability<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/td>\n<td><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<h2><span id=\"pm_vulnprodstable\" class=\"pm\">&#8211;<\/span> Products Affected By CVE-2019-6244<\/h2>\n<table id=\"vulnprodstable\" class=\"listtable\">\n<tbody>\n<tr>\n<th class=\"num\">#<\/th>\n<th>Product Type<\/th>\n<th>Vendor<\/th>\n<th>Product<\/th>\n<th>Version<\/th>\n<th>Update<\/th>\n<th>Edition<\/th>\n<th>Language<\/th>\n<\/tr>\n<tr>\n<td colspan=\"10\">No vulnerable product found. If the vulnerability is created recently it may take a few days to gather vulnerable products list and other information like cvss scores. Please check again in a few days.<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<h2><span id=\"pm_vulnrefstable\" class=\"pm\">&#8211;<\/span> References For CVE-2019-6244<\/h2>\n<\/td>\n<td align=\"left\" valign=\"top\"><\/td>\n<\/tr>\n<tr>\n<td>\n<h2><span id=\"pm_metasploitmodstable\" class=\"pm\">&#8211;<\/span> Metasploit Modules Related To CVE-2019-6244<\/h2>\n<\/td>\n<td><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/div>\n<\/td>\n<td align=\"left\" valign=\"top\"><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<div class=\"disclaimer\" dir=\"ltr\">CVE is a registred trademark of the MITRE Corporation and the authoritative source of CVE content is <a href=\"http:\/\/cve.mitre.org\/\" target=\"_blank\" rel=\"noopener noreferrer\">MITRE&#8217;s CVE web site<\/a>. CWE is a registred trademark of the MITRE Corporation and the authoritative source of CWE content is <a href=\"http:\/\/cwe.mitre.org\/\" target=\"_blank\" rel=\"noopener noreferrer\">MITRE&#8217;s CWE web site<\/a>. OVAL is a registered trademark of The MITRE Corporation and the authoritative source of OVAL content is <a href=\"http:\/\/oval.mitre.org\" target=\"_blank\" rel=\"noopener noreferrer\">MITRE&#8217;s OVAL web site<\/a>.<\/div>\n<p dir=\"ltr\">Use of this information constitutes acceptance for use in an AS IS condition.<br \/>\nThere are NO warranties, implied or otherwise, with regard to this information or its use.<br \/>\nAny use of this information is at the user&#8217;s risk.<br \/>\nIt is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content.<br \/>\nEACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site.<br \/>\nALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT,<br \/>\nINDIRECT or any other kind of loss.<\/p>\n<p dir=\"ltr\">\n\u0645\u062f\u06cc\u0631\u06cc\u062a \u0633\u0631\u0648\u0631 \u067e\u0634\u062a\u06cc\u0628\u0627\u0646\u06cc \u0648 \u0645\u0634\u0627\u0648\u0631\u0647 &#8211; \u062b\u0628\u062a \u062f\u0627\u0645\u0646\u0647<\/p>\n","protected":false},"excerpt":{"rendered":"<p>&nbsp; An issue was discovered in UsualToolCMS 8.0. cmsadmin\/a_sqlbackx.php?t=sql allows CSRF attacks that can execute SQL statements, and consequently execute arbitrary PHP code by writing that code into a .php file. Publish Date : 2019-01-11 Last Update Date : 2019-01-11 &#8211; CVSS Scores &amp; Vulnerability Types CVSS Score 0.0 Confidentiality Impact ??? Integrity Impact ??? &hellip;<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[26],"tags":[],"class_list":["post-10437","post","type-post","status-publish","format-standard","hentry","category-vulnerability"],"_links":{"self":[{"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/posts\/10437","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/comments?post=10437"}],"version-history":[{"count":0,"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/posts\/10437\/revisions"}],"wp:attachment":[{"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/media?parent=10437"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/categories?post=10437"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/tags?post=10437"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}